[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-apple.html proprietary-...
From: |
Therese Godefroy |
Subject: |
www/proprietary malware-apple.html proprietary-... |
Date: |
Thu, 31 Oct 2019 07:26:09 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 19/10/31 07:26:09
Modified files:
proprietary : malware-apple.html
proprietary-surveillance.html proprietary.html
proprietary/workshop: mal.rec
Log message:
Safari spies on users for Tencent (www-discuss 2019-10-31).
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.172&r2=1.173
Patches:
Index: malware-apple.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-apple.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- malware-apple.html 21 Oct 2019 06:53:51 -0000 1.115
+++ malware-apple.html 31 Oct 2019 11:26:06 -0000 1.116
@@ -604,6 +604,18 @@
<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs that a rough screening has detected
+ as possibly “fraudulent.” Since Tencent collaborates
+ with the government, its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
+ originating from single IP addresses, the government can identify
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
+ </li>
+
<li id="M201910130">
<p>The Chinese Communist Party's “Study
the Great Nation” app requires users to grant it <a
@@ -889,7 +901,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/21 06:53:51 $
+$Date: 2019/10/31 11:26:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- proprietary-surveillance.html 19 Oct 2019 09:56:22 -0000 1.303
+++ proprietary-surveillance.html 31 Oct 2019 11:26:07 -0000 1.304
@@ -494,6 +494,18 @@
</div>
<ul class="blurbs">
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs that a rough screening has detected
+ as possibly “fraudulent.” Since Tencent collaborates
+ with the government, its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
+ originating from single IP addresses, the government can identify
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
+ </li>
+
<li id="M201905280">
<p>In spite of Apple's supposed commitment to
privacy, iPhone apps contain trackers that are busy at night <a
@@ -2522,7 +2534,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 09:56:22 $
+$Date: 2019/10/31 11:26:07 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- proprietary.html 28 Oct 2019 06:53:10 -0000 1.186
+++ proprietary.html 31 Oct 2019 11:26:08 -0000 1.187
@@ -149,6 +149,18 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201910131">
+ <p>Safari occasionally <a
+
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
+ sends browsing data from Apple devices in China to the Tencent Safe
+ Browsing service</a>, to check URLs that a rough screening has detected
+ as possibly “fraudulent.” Since Tencent collaborates
+ with the government, its Safe Browsing black list most certainly
+ contains the websites of political opponents. By linking the requests
+ originating from single IP addresses, the government can identify
+ dissenters in China and Hong Kong, thus endangering their lives.</p>
+ </li>
+
<li id="M201904080">
<p>Apple plans to require that <a
href="https://www.macrumors.com/2019/04/08/mac-apps-notarization-macos-10-14-5/">
@@ -210,14 +222,6 @@
<p>Obeying the “local laws” about what people can do with
software is no excuse for censoring what software people can use.</p>
</li>
-
- <li id="M201910071">
- <p>Adobe has <a
-
href="https://www.bleepingcomputer.com/news/software/adobe-to-ban-users-from-venezuela-due-to-us-executive-order">
- cancelled the software subscriptions of all users in
- Venezuela</a>. This demonstrates how a requirement for subscription can be
- turned into a tool for sabotage.</p>
- </li>
</ul>
@@ -278,7 +282,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/28 06:53:10 $
+$Date: 2019/10/31 11:26:08 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- workshop/mal.rec 28 Oct 2019 06:53:11 -0000 1.172
+++ workshop/mal.rec 31 Oct 2019 11:26:08 -0000 1.173
@@ -25,6 +25,23 @@
#### Please don't remove the blank line after this marker! ####
# ADD NEW BLURB HERE
+Added: 2019-10-31
+Id: 201910131
+RT: www-discuss 2019-10-31 (Safari spies on users for Tencent)
+PubDate: 2019-10-13
+Target: proprietary-surveillance.html SpywareIniThings
+Target: malware-apple.html surveillance
+Keywords: macos ios
+Blurb: <p>Safari occasionally <a
++
href="https://blog.cryptographyengineering.com/2019/10/13/dear-apple-safe-browsing-might-not-be-that-safe/">
++ sends browsing data from Apple devices in China to the Tencent Safe
++ Browsing service</a>, to check URLs that a rough screening has detected
++ as possibly “fraudulent.” Since Tencent collaborates
++ with the government, its Safe Browsing black list most certainly
++ contains the websites of political opponents. By linking the requests
++ originating from single IP addresses, the government can identify
++ dissenters in China and Hong Kong, thus endangering their lives.</p>
+
Id: 200803070
PubDate: 2008-03-07
Target: malware-apple.html jails
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/05
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/07
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/15
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/16
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/19
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/19
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/19
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/20
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/21
- www/proprietary malware-apple.html proprietary-...,
Therese Godefroy <=
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/31
- www/proprietary malware-apple.html proprietary-..., Therese Godefroy, 2019/10/31